Research Article

Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms

Table 2

User interaction scenarios analyzed in this study.

CategoryUser interaction scenario

ConfidentialityInformation leakage (trip/location records, camera video/images, contact list, call/SMS history)
IntegrityIntentionally manipulated application installation (injection of malicious code disguised as a modified application)
AvailabilityContinuous resource consumption (large-scale traffic transmission) and system termination (intentionally resulting in various exception cases)